Week 5 - Vulnerability Assessment, Research, and Reporting
- Access Control
- Authentication
- Malware
- Software Vulnerabilities
- Format
- encoding
- e.g. unicode vulnerabilities
- Cookies
- authentication
- Replay Attacks
- TCP Attacks
- SSL/TLS
- encryption
- Routing protocols
- VPN
- IP Spoofing
- Firewalls
- MAC Spoofing
- ARP
- Physical security
- Locks
- Cables
- Wireless
- Biometrics
- Human Errors
- Insider threat
- social engineering
- indifference
- Functions
- storage
- memory management
- input validation
- Access Control
- memory
- malware
- backdoor
- OS/Kernel
- Map the network
- Services
- Leaks
- Intercept Traffic
- Zero Knowledge
- Testing as Attacker
- Some Knowledge
- Testing as User with access to some data
- Full Knowledge
- Testing as Developer
- Asset Discovery
- Asset Prioritisation
- Vulnerability Scanning
- Result analysis & remediation
- Continuos Security
- Understand the scope
- What are the objectives
- Understanding priorities
- White Box Testing
- Access to the network/Site Management
- Knowledge of resources
- Passive Means
- Google Dorking
- Shodan
- OSINT
- Threat Intelligence
- Active Means
- Port Scans
- Web Crawling
- Social Engineering and Phishing
- Sorting the risk and impact of resources
- Sorting vulnerabilities by the level of weakness
- How is the data stored?
- Memory
- Database
- File
- Cloud
- Access Control
- People
- How is data processed?
- Computer architecture
- Memory
- Applications
- People
- How is data Transmitted?
- Encryption
- Medium
- Protocols
- People
- Is User input trusted?
- Find injection points
- Web input
- network packets
- e.g. CVE-2019-3568
- Fuzzing
- Testing
- Exploit
- Find injection points
- Common Pitfalls
- Common Errors & Vulnerabilities
- Default configurations
- Exposed data and credentials
- Source Code
- Bugs
- Reverse Engineer
- Protocol Analysis
- Fuzzing
- Enumeration
- Hostnames
- Passwords
- Directories
- Services
- Stress Testing
- Essentially Port and Directory Scans
- Banner Grabbing
- Identifying services
- Checking for confidential files
- Misconfigurations
- Attempts subtle testing
- Checks identified version of softeare and services against vulnerability databases
- Network-Based Scans
- Identifies possible network security attacks and vulnerable systems on networks
- Host-Based Scans
- Finds vulnerabilities in workstations, servers, or other network hosts, and provides visibility into configuration settings and patch history
- Wireless Scans
- Identifies rogue access points and validate that a company’s network is securely configured
- Application Scans
- Detects known software vulnerabilities and mis-configurations in network or web apps
- Database Scans
- Identifies the weak points in a database
Scanners:
- Nikto
- Nmap
- OpenVAS
- Metasploit
- OWASP ZAP Scanner
- Nexpose
- Nessus
- Qualys
- Tenable